ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    ZeroTier and DNS issues

    IT Discussion
    zerotier dns vpn
    10
    176
    102.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • coliverC
      coliver @adam.ierymenko
      last edited by

      @adam.ierymenko said:

      ??? Could this perhaps be helpful?

      https://support.microsoft.com/en-us/kb/2526067

      Yep, that's what I ended up doing. It worked out for what we needed.

      1 Reply Last reply Reply Quote 0
      • A
        adam.ierymenko
        last edited by

        @scottalanmiller I wonder then: why all the DNS magic if the issue can be solved by simply setting connection priority? Or did the under the hood DNS magic solve a different issue?

        1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender
          last edited by

          Adam, Welcome to ML! thanks for taking the time to join and post!

          Here's my setup.

          I have a DC (DC2) that is also a file server that has ZT installed on it. I have one client laptop that also has ZT installed and connects to the DC/Fileserver just fine.

          The problem, as you surmised, is that the ZT adapter registered itself with DNS when it came online. My DNS server now has two IP addresses for this DC.

          Hold on to you seat, I'm going to spill a whole lot more information.

          I discovered a problem when I was on DC1 trying to ping DC2. When I typed

           ping dc1
          

          I received the IP address for the ZT adapter, and the request timed out (there's no route to get there on my network).
          Even pinging

           ping dc1.domain.com
          

          didn't work, same result.
          At first I had completely forgotten about my installation of ZT on DC2 and even though IP provided by the above ping tests wasn't something listed in my external DNS (Split brain DNS) I recall having weird DNS issues in the past when IPv6 was enabled. I disabled IPv6 on DC1, tried the ping test again, wala! it worked.

          I started digging around a bit more trying to figure out where this oddball 10.x.x.x address was coming from and then I bumped into my install of ZT. OK mystery solved.

          I jumped into DNS and found the second DNS record for DC2 with the ZT IP.

          Now I'm asking myself - what keeps DNS from giving the ZT IP to internal Windows clients when they are querying for DC2?

          This lead me to the desire to remove the second entry, but I couldn't just delete it from DNS, the next time the adapter refreshes on DC2 it will simply be re-added. So someone suggested removing the checkmark next to "Register this connection's addresses in DNS" under Adapter settings > ZT adapter > IPv4 > Advanced button > DNS tab. Sadly that didn't work. Why you ask? Because Windows won't allow you to access the DNS tab if you don't manually assign an IP address to the adapter, and ZT is using DHCP. Now I'm guessing there is a registry key I could change - but before I went that far, I started this thread.

          Upon further consideration I also realized that I don't want to remove the ZT IP from DNS, because then my ZT client would no longer be able to use DNS to find DC2.

          Hopefully this is enough to get started.

          1 Reply Last reply Reply Quote 1
          • DashrenderD
            Dashrender @adam.ierymenko
            last edited by

            @adam.ierymenko said:

            ??? Could this perhaps be helpful?

            https://support.microsoft.com/en-us/kb/2526067

            This would not have solved my issue, ZT wasn't installed on DC1, so there was nothing to change.

            1 Reply Last reply Reply Quote 0
            • A
              adam.ierymenko
              last edited by

              @Dashrender

              "Upon further consideration I also realized that I don't want to remove the ZT IP from DNS, because then my ZT client would no longer be able to use DNS to find DC2."

              Oh my. The horror. Let me check my understanding. What you want (ideally) is:

              (1) Clients on the regular network get regular network addresses when they resolve things, especially the DCs.

              (2) Clients on the ZeroTier network get ZeroTier network addresses when they resolve things, especially the DCs.

              ... but DNS and AD were not designed for multi-path or multi-network use.

              I think I might understand Pertino's hack now. They hacked multipath into DNS by rewriting DNS queries or responses based on which networks you belong to. (???)

              If this were a greenfield deployment I'd suggest using ZeroTier as the company LAN and binding AD only to that. This is what we'd call the "fully virtualized network." We have some distributed teams doing that and it works fine, though they had to do a bit of hackery to coax AD into preferring the ZT interface.

              Here's an idea, though we have not tried this:

              Don't run ZeroTier on the domain controllers. Instead, set up a Linux VM and bridge the DC's network to the ZeroTier network. Then set up the ZT network to assign IPs within the main network's range but in a region that will not be handed out on the main network by its DHCP servers. Now when clients join ZT they get another main network IP address and from the perspective of any clients on the main network they now have two connections to it. It looks as if they have two network cards with two cables plugged into the same switch (which is legal, and each will get a different IP).

              Then set the physical interface to higher priority on the clients. When connected to the LAN, clients will go over that. When off-site, clients will go through ZT.

              Now you no longer have two address spaces, so DNS will just have one IP.

              1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender
                last edited by

                That solution looks good for a primarily mobile user, so you'll have little concern about having two DNS entries for the client in DNS. This is a problem when you are trying to manage the client devices, you can run into the same problem as my two IP addressed DC.

                But I see the potential for a lot of problems for someone who is in and out, and finding themselves most of the time having two DNS entries.

                1 Reply Last reply Reply Quote 0
                • A
                  adam.ierymenko
                  last edited by

                  On further thought, I wonder if it would work if ZT were given the same IP scheme as the main network, but were set to a lower priority on all machines. Then it would be used as an alternate path and only if the main network were not available.

                  This might be something we'd want to officially support: "shadow network" use case?

                  1 Reply Last reply Reply Quote 0
                  • A
                    adam.ierymenko
                    last edited by

                    @Dashrender Yes, I can see issues as well. Unfortunately I can't see a clean solution that doesn't involve either changing the layout of things or some form of client-side hackery. But I want to think about this a bit longer.

                    1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender
                      last edited by

                      I'll agree that DNS doesn't handle mulit-homed computers well - well that's to say that our ability to use DNS effectively when a device has more than one registered IP is poor at best.

                      AD itself doesn't care about IP space other than it's ability to reference DNS to find a device, which is a mandate, but not what I would call a failing or falter on the part of AD.

                      1 Reply Last reply Reply Quote 0
                      • A
                        adam.ierymenko
                        last edited by

                        @Dashrender Can you go up a level and out of the realm of technical details and explain what you're actually attempting to accomplish? Is this a road warrior use case or something else like inter-site collaboration?

                        1 Reply Last reply Reply Quote 1
                        • DashrenderD
                          Dashrender
                          last edited by

                          @scottalanmiller or anyone who uses Pertino, Are the Pertino addresses registered to your AD's DNS servers?

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @Dashrender
                            last edited by

                            @Dashrender said:

                            @scottalanmiller or anyone who uses Pertino, Are the Pertino addresses registered to your AD's DNS servers?

                            Yes, that is how the machines locate each other.

                            1 Reply Last reply Reply Quote 0
                            • dafyreD
                              dafyre
                              last edited by

                              In this instance, couldn't we just let the company DHCP assign IP addresses across the bridge?

                              DashrenderD 1 Reply Last reply Reply Quote 0
                              • DashrenderD
                                Dashrender
                                last edited by

                                So this is for someone who has a network with both Pertino enabled endpoints, and NOT enabled endpoints.

                                Do you ever have an issue where a local client is trying to reach a DC that is multi-homed (local LAN and Pertino)? if so, what was the issue? was it that DNS was giving you the Pertino IP?

                                1 Reply Last reply Reply Quote 0
                                • DashrenderD
                                  Dashrender @dafyre
                                  last edited by

                                  @dafyre said:

                                  In this instance, couldn't we just let the company DHCP assign IP addresses across the bridge?

                                  Assuming the bridge will pass the DHCP request to the network, that should be possible.

                                  I'd be more worried about the long term problem - laptop user at the office during the day, home at night - they will end up with two IP's in DNS, and two IPs taken in DHCP.

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    adam.ierymenko
                                    last edited by

                                    This discussion is helpful toward a product idea we've had for a long time: a very simple device that can be plugged into a physical network and will "extend" it. Basically you plug in this device and it creates a virtual ZeroTier network that you join on endpoint devices. The missing piece for us has been "what then?" How should IPs be assigned on this virtual network and what should endpoint devices do with those IPs? I think this is giving me some ideas, and they're very very interesting. Short answer: "no IPs should be assigned" and "the virtual network should shadow the physical and only be used if the physical is not available."

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      adam.ierymenko
                                      last edited by

                                      Basically it's virtual redundant multipath ethernet. If you've ever used network bonding, you can set two interfaces to connect to two different switches such that if one switch fails the second link takes over and traffic is not interrupted. This would be the same thing but with a virtual network as failover path.

                                      1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender
                                        last edited by

                                        I don't know if this is possible, but if the ZT interface could present itself as the MAC address of the normal LAN adapter to get the same IP it would get on it's normal adapter when it's in the office, that would be cool.

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          adam.ierymenko
                                          last edited by

                                          That is entirely possible. Ideas in progress. 🙂

                                          In the short term I'm not sure what to do, but priority seems like part of the answer.

                                          1 Reply Last reply Reply Quote 0
                                          • dafyreD
                                            dafyre
                                            last edited by

                                            What I have done on my own network at home is build my own ZeroTier router... it has 1 Interface on my LAN, and 1 x ZeroTier interface...and that ZeroTier client has the Gateway option activated.

                                            And it routes to my Home Network. NB: I had to add a route to my ZeroTier IP space on my home router as well, so traffic could flow both ways...

                                            IE: On my home router, I had a route for 192.168.100.0/24 (zero tier ip space) to 192.168.1.179 (LAN interface of my zero tier router).

                                            On remote Client devices, I add a route to 192.168.1.0/24 via 192.168.100.179 (ZT IP addresss of my ZTRouter).

                                            This seems to work. Arguably it would work better if I had more RAM to add to my VM, lol.

                                            DashrenderD 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 7
                                            • 8
                                            • 9
                                            • 4 / 9
                                            • First post
                                              Last post